Holes are generated due to limited precision of deployment, and thus bypassing holes is one important issue of Wireless Sensor Networks (WSNs). In existing routing schemes using an optimal path, intermediate nodes in the path may deplete their energy quickly, which results in expansion of holes. The Ant Colony Optimization
...

In Mobile Ad-hoc NETwork (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the MANET. In order to facilitate communication within the network, a routing protocol is used to discover routes between
...

In virtualized clouds, machine memory is known as a resource that primarily limits consolidation level due to the expensive cost of hardware extension and power consumption. To address this limitation, various memory deduplication techniques have been proposed to increase available machine memory by eliminating memory redundancy. Existing memory deduplication techniques,
...

Over the past decades, the protection system for digital content has been introduced in numerous literatures. It mainly focuses on providing secure communication channel and copy protection. These protection systems usually use well-known cryptograph algorithms which are regarded as the most secure way for protection. Nevertheless, these technologies were circumvented
...

One of the effective techniques of improving the coverage and enhancing the capacity and data rate in cellular wireless networks is to reduce the cell size (i.e., cell splitting) and transmission distances. Therefore, the concept of deploying femtocells over macrocell has recently attracted growing interests in academia, industry, and standardization
...

People commonly use USB flash memory because of its convenience and portability. It stores various data such as documents, pictures, certificates, and private data (e.g., passwords, account numbers). These data, especially private data, should not be revealed to the outside. However, even when the stored data is deleted, these data
...

Software is completely exposed to an attacker after it is distributed because reverse engineering is widely known. To protect software, techniques against reverse engineering are necessary. A code encryption scheme is one of the techniques. A code encryption scheme encrypts the binary executable code. Key management is the most important
...

Though the implementation of the Tate pairing is commonly believed to be computationally more intensive than other cryptographic operations, such as ECC point multiplication, there has been a substantial progress in speeding up the Tate pairing computations. Because of their inherent parallelism, the existing Tate pairing algorithms are very suitable
...